{"title":"SIM-KM: scalable infrastructure for multicast key management","authors":"R. Mukherjee, J. Atwood","doi":"10.1109/LCN.2004.114","DOIUrl":null,"url":null,"abstract":"Multicasting has not been adopted by service providers, even for such \"obvious\" applications as distribution of entertainment. For the successful deployment of such services, a security infrastructures must be developed and deployed to provide access control. We present a scalable infrastructure for multicast key management (SIM-KM). SIM-KM is a complete secure key management scheme using proxy encryptions. It is a robust, highly scalable and efficient key management and distribution scheme combining the advantages of subgroup based and key hierarchy based group key management schemes. It provides support for recovery from compromises and employs dynamic batching techniques for optimum performance.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"29th Annual IEEE International Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2004.114","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24
Abstract
Multicasting has not been adopted by service providers, even for such "obvious" applications as distribution of entertainment. For the successful deployment of such services, a security infrastructures must be developed and deployed to provide access control. We present a scalable infrastructure for multicast key management (SIM-KM). SIM-KM is a complete secure key management scheme using proxy encryptions. It is a robust, highly scalable and efficient key management and distribution scheme combining the advantages of subgroup based and key hierarchy based group key management schemes. It provides support for recovery from compromises and employs dynamic batching techniques for optimum performance.